Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe
-
Size
508KB
-
MD5
ebd494a0747eab84aac0b4feb25f4f26
-
SHA1
5bfdd529187ba019eeaf1a2867941308cb19a721
-
SHA256
33b2a70bdd26061272b778e683b6e7f904060677d05c8aa26595cd44c5d11b50
-
SHA512
c4a730a9ff85190fd8f82b6af7acafeba745d03aa0df14dfb5efeed51eb9e2266d5dca4c86124e96325c7ad0d1eefc23d7abb8aff13c165eb0ab24ecd9493584
-
SSDEEP
12288:mHCxJuzO8PW418jZZUozZuzYgwz3r14Y07KCJ:8ddZ+tZlVUYBzB0KC
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2220 audiptsp.exe 1124 audiptsp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adsnvice = "C:\\Users\\Admin\\AppData\\Roaming\\AUDIbapi\\audiptsp.exe" ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 3220 set thread context of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 2220 set thread context of 1124 2220 audiptsp.exe 103 PID 1124 set thread context of 1804 1124 audiptsp.exe 104 PID 1804 set thread context of 3556 1804 svchost.exe 56 PID 3556 set thread context of 4008 3556 Explorer.EXE 60 PID 3556 set thread context of 2948 3556 Explorer.EXE 62 PID 3556 set thread context of 2512 3556 Explorer.EXE 76 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiptsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiptsp.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 audiptsp.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName audiptsp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1124 audiptsp.exe 1124 audiptsp.exe 3556 Explorer.EXE 3556 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1124 audiptsp.exe 1804 svchost.exe 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3556 Explorer.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3220 wrote to memory of 3052 3220 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 95 PID 3052 wrote to memory of 1416 3052 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 96 PID 3052 wrote to memory of 1416 3052 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 96 PID 3052 wrote to memory of 1416 3052 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 96 PID 1416 wrote to memory of 1516 1416 cmd.exe 98 PID 1416 wrote to memory of 1516 1416 cmd.exe 98 PID 1416 wrote to memory of 1516 1416 cmd.exe 98 PID 1516 wrote to memory of 2220 1516 cmd.exe 99 PID 1516 wrote to memory of 2220 1516 cmd.exe 99 PID 1516 wrote to memory of 2220 1516 cmd.exe 99 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 2220 wrote to memory of 1124 2220 audiptsp.exe 103 PID 1124 wrote to memory of 1804 1124 audiptsp.exe 104 PID 1124 wrote to memory of 1804 1124 audiptsp.exe 104 PID 1124 wrote to memory of 1804 1124 audiptsp.exe 104 PID 1124 wrote to memory of 1804 1124 audiptsp.exe 104 PID 1124 wrote to memory of 1804 1124 audiptsp.exe 104 PID 1804 wrote to memory of 3556 1804 svchost.exe 56 PID 1804 wrote to memory of 3556 1804 svchost.exe 56 PID 1804 wrote to memory of 3556 1804 svchost.exe 56 PID 3556 wrote to memory of 4008 3556 Explorer.EXE 60 PID 3556 wrote to memory of 4008 3556 Explorer.EXE 60 PID 3556 wrote to memory of 4008 3556 Explorer.EXE 60 PID 3556 wrote to memory of 2948 3556 Explorer.EXE 62 PID 3556 wrote to memory of 2948 3556 Explorer.EXE 62 PID 3556 wrote to memory of 2948 3556 Explorer.EXE 62 PID 3556 wrote to memory of 2512 3556 Explorer.EXE 76 PID 3556 wrote to memory of 2512 3556 Explorer.EXE 76 PID 3556 wrote to memory of 2512 3556 Explorer.EXE 76
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CB3A\E59D.bat" "C:\Users\Admin\AppData\Roaming\AUDIbapi\audiptsp.exe" "C:\Users\Admin\AppData\Local\Temp\EBD494~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AUDIbapi\audiptsp.exe" "C:\Users\Admin\AppData\Local\Temp\EBD494~1.EXE""5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Roaming\AUDIbapi\audiptsp.exe"C:\Users\Admin\AppData\Roaming\AUDIbapi\audiptsp.exe" "C:\Users\Admin\AppData\Local\Temp\EBD494~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\AUDIbapi\audiptsp.exe"C:\Users\Admin\AppData\Roaming\AUDIbapi\audiptsp.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1804
-
-
-
-
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4008
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2948
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5e2c5d9a9f013ce98366ecd24e95a2f83
SHA11ab3c365c375a01b592e88998d148f72a0447677
SHA256df8a12cd8c1e19e836d16c83d9e4c7bd5e92ad920eac7f322052f4fd47a5e8fb
SHA51253d383ecac18e1206a73eeb74573cc69b2fad7959715ef6002f63239d5e098c559656af1f17703c6449b510c4dcabc7ec5dbb5183485f3f21e78ce1577d0a333
-
Filesize
508KB
MD5ebd494a0747eab84aac0b4feb25f4f26
SHA15bfdd529187ba019eeaf1a2867941308cb19a721
SHA25633b2a70bdd26061272b778e683b6e7f904060677d05c8aa26595cd44c5d11b50
SHA512c4a730a9ff85190fd8f82b6af7acafeba745d03aa0df14dfb5efeed51eb9e2266d5dca4c86124e96325c7ad0d1eefc23d7abb8aff13c165eb0ab24ecd9493584